Sciweavers

839 search results - page 143 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
JCDL
2011
ACM
301views Education» more  JCDL 2011»
14 years 3 months ago
Archiving the web using page changes patterns: a case study
A pattern is a model or a template used to summarize and describe the behavior (or the trend) of a data having generally some recurrent events. Patterns have received a considerab...
Myriam Ben Saad, Stéphane Gançarski
108
Voted
CIKM
2009
Springer
15 years 7 months ago
Group CRM: a new telecom CRM framework from social network perspective
The structure of customer communication network provides us a natural way to understand customers’ relationships. Traditional customer relationship management (CRM) methods focu...
Bin Wu, Qi Ye, Shengqi Yang, Bai Wang
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
15 years 2 months ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink
149
Voted
VLDB
2002
ACM
116views Database» more  VLDB 2002»
15 years 13 days ago
Watermarking Relational Databases
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking,...
Rakesh Agrawal, Jerry Kiernan
98
Voted
BMCBI
2006
127views more  BMCBI 2006»
15 years 26 days ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...